The specification and enforcement of advanced security policies
- 25 June 2003
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
No abstract availableThis publication has 11 references indexed in Scilit:
- Proxy-based authorization and accounting for distributed systemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Decentralized trust managementPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Access control in an open distributed environmentPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Representation and evaluation of security policies for distributed system servicesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- The Set and Function Approach to Modeling Authorization in Distributed SystemsLecture Notes in Computer Science, 2001
- Law-governed interactionACM Transactions on Software Engineering and Methodology, 2000
- Compliance checking in the PolicyMaker trust management systemPublished by Springer Nature ,1998
- Globus: a Metacomputing Infrastructure ToolkitThe International Journal of Supercomputer Applications and High Performance Computing, 1997
- Kerberos: an authentication service for computer networksIEEE Communications Magazine, 1994
- A survey of intrusion detection techniquesComputers & Security, 1993